1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Phishing
a type of online fraud where criminals impersonate legitimate sources like companies or individuals to trick people into revealing sensitive information
Typosquatting
where malicious actors register domain names that are slight misspellings or variations of popular, legitimate websites to intercept traffic from users who make typographical errors
Pretexting
attack where a scammer creates a fabricated scenario to manipulate a victim into divulging sensitive information or granting unauthorized access
Impersonation
attackers pretending to be someone they aren’t
Watering hole attack
an attack where hackers infect a website the target group is likely to visit, hoping the victims get infected when they go there
Dynamic-link library (DLL) Injection
a technique where an attacker forces a malicious DLL into a running process to run code inside it
Buffer overflow
an attack where more data is written to a memory buffer than it can hold, causing the program to overwrite nearby memory.
Race Condition
A flaw where the behavior of a system changes depending on the timing of two or more processes running at the same time
TOCTOU (Time of Check to Time of Use)
A race condition where an attacker changes something between when it’s checked and when it’s used.